Explicit content and cyberthreats: 2019 report
‘Stay at home’ is the new motto for 2020 and it has entailed many changes to our daily lives, most importantly, in terms of our digital content consumption. With users opting to entertain themselves online, malicious activity has grown. Over the past two years we have reviewed how adult content has been used to spread […] more…Threats to macOS users
Introduction The belief that there are no threats for the macOS operating system (or at least no serious threats) has been bandied about for decades. The owners of MacBooks and iMacs are only rivaled by Linux users in terms of the level of confidence in their own security, and we must admit that they are […] more…Kaspersky Security Bulletin 2018. Top security stories
Introduction The internet is now woven into the fabric of our lives. Many people routinely bank, shop and socialize online and the internet is the lifeblood of commercial organizations. The dependence on technology of governments, businesses and consumers provides a broad attack surface for attackers with all kinds of motives – financial theft, theft of […] more…Windows 10 Preview and Security
Microsoft presented a preview of their newest “experience”, Windows 10, over a live stream this morning. The release is expected later this year. This isn’t envisioned as just an OS for desktops, but it brings support as a truly broad computing platform. They claim to have built Windows 10 with “more personal computing” in mind, and […] more…Tap Your Tech to Chase Off Summer Boredom
Summer is here and with it comes that foreboding stretch of empty highway parents call summer break. Sure, it’s peppered with sun and fun, snow cones, a vacation perhaps, but then—sometime into the third week—comes the notorious whine “I’m boooooored!” Relax, technology is on your side during those long days, parents. So fire up your […] more…More information
- Microsoft relaxes telemetry rule for PCs managed with Windows Update for Business
- New Fujitsu Labs tech can do batch searches of encrypted data
- Cyber Criminals Take Advantage of Recent Boston Attack with SPAM
- MailPoet Vulnerability Exploited in the Wild – Breaking Thousands of WordPress Sites
- The data breach quiz: What have we learned?
- 19% of shoppers would abandon a retailer that’s been hacked
- Deadly Secret: Electronic Warfare Shapes Russia-Ukraine War
- Pay-to-click ad service hacked, 6.6M plaintext passwords dumped
- Microsoft Warns Governments Against Exploit Stockpiling
- Apple Offers Hackable iPhones to Security Researchers